Vulnerability Researcher

Vulnerability Researcher

Cheltenham Full-Time 36000 - 60000 £ / year (est.) No home office possible
B

At a Glance

  • Tasks: Join a talented team to tackle complex cyber security challenges and conduct cutting-edge research.
  • Company: Be part of a world-class team delivering bespoke products for top UK cyber security clients.
  • Benefits: Enjoy a collaborative environment with opportunities for professional growth and skill development.
  • Why this job: Make a real-world impact while working on innovative solutions in a dynamic field.
  • Qualifications: Passion for cyber security, experience in reverse engineering, and knowledge of vulnerability research required.
  • Other info: Ideal for those who love problem-solving and sharing knowledge with like-minded peers.

The predicted salary is between 36000 - 60000 £ per year.

My client is seeking an experienced vulnerability researcher to join their team based in Cheltenham. The rolewill see you join a world-class team of developers and vulnerability researchers whose mission is to deliver bespoke products and research into the most interesting cyber security clients in the UK.

The team is highly experienced, deeply technical and has a rich history of blending rapid prototyping, security research and software engineering skills. Their Research team use Ghidra as their tool of choice for reverse engineering and produce proof of concepts in the most suitable language for their projects which could be C, C++, Python or assembly code. The role requires an inquisitive mindset and enthusiasm for solving difficult research tasks.

The Role:

  • Working alongside hugely talented vulnerability researchers and software engineers.
  • Tackling a wide range of challenging problems.
  • Conducting cutting-edge, novel and world-leading research.
  • Designing and producing niche solutions with immediate real-world impact.

An ideal candidate will:

  • Have a passion for cyber security.
  • Thrive on solving difficult and complex problems.
  • Havea genuine interest in bug hunting and be familiar with recent vulnerabilities.
  • Enjoy sharing their knowledge and working with team members.

Your Experience

  • Reverse engineering in IDA Pro or Ghidra.
  • Familiarity with one or more of ARM, AARCH64, x86, x64.
  • Knowledge of bug hunting / vulnerability research.
  • Ethical hacking.
  • Knowledge of exploitation techniques and mitigations.
  • Experience and knowledge of Linux and its internals.
  • Experience and knowledge of Android or iOS and its internals.

#J-18808-Ljbffr

Vulnerability Researcher employer: Berkeley Square IT

Join a leading cyber security firm in Cheltenham, where you will be part of a world-class team dedicated to innovative research and development. The company fosters a collaborative work culture that encourages knowledge sharing and personal growth, offering opportunities to tackle complex challenges while making a real-world impact. With access to cutting-edge tools and a focus on employee development, this role is perfect for those passionate about cyber security and looking to advance their careers in a supportive environment.
B

Contact Detail:

Berkeley Square IT Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Vulnerability Researcher

✨Tip Number 1

Familiarise yourself with the latest trends in vulnerability research and cyber security. Follow relevant blogs, forums, and social media channels to stay updated on recent vulnerabilities and bug hunting techniques that could impress our team.

✨Tip Number 2

Engage with the cyber security community by attending meetups, conferences, or webinars. Networking with professionals in the field can provide valuable insights and may even lead to referrals for positions like the one we have at StudySmarter.

✨Tip Number 3

Showcase your skills through personal projects or contributions to open-source software. Demonstrating your reverse engineering capabilities using tools like Ghidra or IDA Pro can set you apart from other candidates.

✨Tip Number 4

Prepare for technical interviews by practising problem-solving scenarios related to vulnerability research. Be ready to discuss your thought process and how you approach complex challenges, as this is crucial for the role at StudySmarter.

We think you need these skills to ace Vulnerability Researcher

Reverse Engineering
Proficiency in Ghidra
Familiarity with IDA Pro
Knowledge of ARM, AARCH64, x86, x64 architectures
Bug Hunting
Vulnerability Research
Ethical Hacking
Exploitation Techniques
Mitigation Strategies
Linux Internals
Android Internals
iOS Internals
Problem-Solving Skills
Inquisitive Mindset
Team Collaboration

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in vulnerability research, reverse engineering, and ethical hacking. Emphasise your familiarity with tools like Ghidra and IDA Pro, as well as your knowledge of various architectures.

Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cyber security and your problem-solving skills. Mention specific projects or experiences that demonstrate your ability to tackle complex challenges and your enthusiasm for bug hunting.

Showcase Technical Skills: In your application, clearly outline your technical skills related to the role. Include programming languages you are proficient in, such as C, C++, Python, or assembly code, and any relevant experience with Linux or mobile operating systems.

Highlight Team Collaboration: Since the role involves working closely with a team, mention any previous experiences where you collaborated with others on research or development projects. This will show your ability to share knowledge and work effectively within a team environment.

How to prepare for a job interview at Berkeley Square IT

✨Show Your Passion for Cyber Security

Make sure to express your enthusiasm for cyber security during the interview. Share any personal projects or experiences that highlight your interest in the field, especially those related to bug hunting and vulnerability research.

✨Demonstrate Technical Proficiency

Be prepared to discuss your experience with reverse engineering tools like Ghidra or IDA Pro. Highlight specific projects where you used these tools, and be ready to explain your thought process and the challenges you faced.

✨Discuss Problem-Solving Skills

The role requires tackling complex problems, so come equipped with examples of how you've approached difficult research tasks in the past. Use the STAR method (Situation, Task, Action, Result) to structure your responses.

✨Emphasise Team Collaboration

Since the team values knowledge sharing, talk about your experiences working in teams. Mention how you’ve collaborated with others on projects, and be sure to convey your willingness to learn from and teach your colleagues.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

B
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>